You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When security vulnerabilities or misconfigurations are actively exploited by
4
+
attackers, organizations need to react quickly in order to protect potentially
5
+
vulnerable assets. As attackers increasingly invest in automation, the time
6
+
window to react to a newly released, high severity vulnerability is usually
7
+
measured in hours. This poses a significant challenge for large organizations
8
+
with thousands or even millions of internet-connected systems. In such
9
+
hyperscale environments, security vulnerabilities must be detected and ideally
10
+
remediated in a fully automated fashion. To do so, information security teams
11
+
need to have the ability to implement and roll out detectors for novel security
12
+
issues at scale in a very short amount of time. Furthermore, it is important
13
+
that the detection quality is consistently very high. To solve these challenges,
14
+
we created Tsunami - an extensible network scanning engine for detecting high
15
+
severity vulnerabilities with high confidence in an unauthenticated manner.
16
+
17
+
## <aname="goal"></a>Goals and Philosophy
18
+
19
+
* Tsunami supports small manually curated set of vulnerabilities
20
+
* Tsunami detects high severity, RCE-like vulnerabilities, which often
21
+
actively exploited in the wild
22
+
* Tsunami generates scan results with high confidence and minimal
23
+
false-positive rate.
24
+
* Tsunami detectors are easy to implement.
25
+
* Tsunami is easy to scale, executes fast and scans non-intrusively.
26
+
27
+
## <aname="naming"></a>Naming
28
+
29
+
The name "Tsunami" comes from the fact that this scanner is meant be used as part of a larger system to warn owners about automated "attack waves". Automated attacks are similar to tsunamis in the way that they come suddenly, without prior warning and can cause a lot of damage to organizations if no precautions are taken. The term "Tsunami Early Warning System Security Scanning Engine" is quite long and thus the name got abbreviated to Tsunami Scanning Engine, or Tsunami. Hence, the name is not an analogy to tsunamis itself, but to a system that detects them and warns everyone about them.
* ... [create a new Tsunami plugin?](/docs/howto.md#create_plugins)
38
14
* ...
39
-
[apply my plugins to certain types of services / software?](howto.md#filter_plugins)
40
-
* ... [add command line arguments for my plugin?](howto.md#command_line)
41
-
* ... [add configuration properties for my plugin?](howto.md#configuration)
42
-
43
-
## <aname="naming"></a>Naming
44
-
45
-
The name "Tsunami" comes from the fact that this scanner is meant be used as part of a larger system to warn owners about automated "attack waves". Automated attacks are similar to tsunamis in the way that they come suddenly, without prior warning and can cause a lot of damage to organizations if no precautions are taken. The term "Tsunami Early Warning System Security Scanning Engine" is quite long and thus the name got abbreviated to Tsunami Scanning Engine, or Tsunami. Hence, the name is not an analogy to tsunamis itself, but to a system that detects them and warns everyone about them.
15
+
[apply my plugins to certain types of services / software?](/docs/howto.md#filter_plugins)
16
+
* ... [add command line arguments for my plugin?](/docs/howto.md#command_line)
17
+
* ... [add configuration properties for my plugin?](/docs/howto.md#configuration)
0 commit comments